If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Re: bruteforce 8 character (uppercase) password

crunch can generate all possible combinations of your 8 character password. If you were to try to save crunch's output to a file the file size will be: 1750GB.
(x^y) * (y+1) = size in bytes
x is the length of the string 8
y is the length of the character set 26
(8^26) * (8+1) = 1750GB

Re: bruteforce 8 character (uppercase) password

Yep - only one way to crack WPA. On my box running 2x Nvidia 465 cards and 295 million passwords in the DB I can punch through the precomputed PMKs in under 5 minute. If the pass-phrase is in the DB then its trivial otherwise your stuck brute forcing with character sets which I haven't been able to get above 50000 PMKs.

"Never do anything against conscience -- even if the state demands it."
-- Albert Einstein

Re: bruteforce 8 character (uppercase) password

Uh, uh... What other way do you know for cracking WPA but bruteforce ?

how bout the traditional way... Dictionary attack

To pipe crunch through aircrack would be a ridiculous waste of life. Even if you piped crunch through pyrit to take advantage of gpu technology it really still wouldn't be a rational option, unless you were brute forcing something like a combination of 8 numbers. My rig performs at right below 150,000 PMKs and even trying to brute force an 8 character password would still be unbelievably time consuming.

I recommend creating a really strong wordlist. If you can, make the list relevant to the target. look into a tool called cupp

precomputed data is good too, but from what I understand each password is salted by the essid of the access point so each password needs to be precomputed for each essid.

Re: bruteforce 8 character (uppercase) password

What are you running that gives you 150000 pmks? I have 2 465s and get 50k but dont do any overclocking. Are you running 6 of these things or do I need to reconfigure my setup. I know the 500 nvidia card series is pretty bad ass and was thinking of getting a couple of those.

I am such a pyrit fanboy now.

by the way there are some good crunch commands that can get you good results.
crunch gets me about 25% of my successful cracks and pyrit DB get the rest.

Originally Posted by 2901119

how bout the traditional way... Dictionary attack

To pipe crunch through aircrack would be a ridiculous waste of life. Even if you piped crunch through pyrit to take advantage of gpu technology it really still wouldn't be a rational option, unless you were brute forcing something like a combination of 8 numbers. My rig performs at right below 150,000 PMKs and even trying to brute force an 8 character password would still be unbelievably time consuming.

I recommend creating a really strong wordlist. If you can, make the list relevant to the target. look into a tool called cupp

precomputed data is good too, but from what I understand each password is salted by the essid of the access point so each password needs to be precomputed for each essid.

"Never do anything against conscience -- even if the state demands it."
-- Albert Einstein

Re: bruteforce 8 character (uppercase) password

im running 2 stock hd 6970s with calpp. They're nice but I wish i would have waited and gotten the 6990s. I originally picked up a gtx 580 but was only getting like 38,000 PMKs so I returned it. Care to share those crunch commands?